Abstract
This paper focuses on the practical aspects of the integration of security services into telecommunication management applications as well as the building blocks needed to achieve a company wide security policy and ensure the consistent usage throughout the Telecommunication Management Network. The OSI security architecture [7] provides the flexibility necessary for the adaption to environments that deal with highly sensitive data like security management in a distributed telecommunication management network. However, to achieve interworking between implementations of different vendors it is of crucial importance to define functional security profiles and hence define an implementable subset of the security services suited to TMN. Prototype implementation and testing in the RACE project R2058 SAMSON has demonstrated that the security services and architectures currently under standardisation are capable to provide sufficient security mechanisms.
This is a preview of subscription content, log in via an institution.
Preview
Unable to display preview. Download preview PDF.
References
CCITT, Melbourne. Recommendation X.500 — The Directory: Overview of Concepts, Models, and Services, 1988.
CCITT, Geneva. The Directory — Part 8: Authentication Framework, Recommendation X.509, 1992.
Commission of the European Communities, RACE Common Functional Specifications: H211: Security of Service Management, Aug 1994.
G. Endersz and It. Zamparo. Key management and the security of management in open systems: the SAMSON prototype. In Information Security — the Next Decade. Chapman & Hall, 1995.
European Computer Manufacturers Association, Geneva. ECMA-138, Security in Open Systems Data Elements and Service Definitions, 1989.
FIPS. Security Requirements for Cryptographic Modules, 1992.
International Standards Organization, Geneva. ISO 7498-2-1988(E), Information processing systems — Open System Interconnection — Basic Reference Model — Part 2: Security Architecture, 1988.
International Standards Organization. ISO/IEC 10736: Information Processing Systems, Open System Interconnection, Transport Layer Security Protocol, 1992.
CCITT, Geneva. Systems Management: Objects and Attributes for Access Control, Recommendation X.741, 1992.
CCITT, Geneva. Systems Management; Security Alarm Reporting Function, Recommendation X.736, 1992.
CCITT, Geneva. Definition of Management Information, Recommendation X.721, 1992.
CCITT, Geneva. Security Audit Trail Function, Recommendation X.740, 1992.
IEEE 802.10D. Key Management Protocol,.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Endersz, G., Gabrielsson, T., Morast, F., Bertsch, A., Bunz, H., Jurečič, M. (1995). TMN security: An evolutionary approach. In: Clarke, A., Campolargo, M., Karatzas, N. (eds) Bringing Telecommunication Services to the People — IS&N '95. IS&N 1995. Lecture Notes in Computer Science, vol 998. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0016955
Download citation
DOI: https://doi.org/10.1007/BFb0016955
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60479-2
Online ISBN: 978-3-540-47618-4
eBook Packages: Springer Book Archive